General

  • Target

    JaffaCakes118_60b575d705bab021160455b8bdaa47d8

  • Size

    5.8MB

  • Sample

    250107-ntabaa1pam

  • MD5

    60b575d705bab021160455b8bdaa47d8

  • SHA1

    8be6507d7d188322c48ce9dcff3f334ac01f24e3

  • SHA256

    80e00489b75a9c8682f88ec4e50aef6fd5f321b825c0542286cd473ab73baa16

  • SHA512

    db407cc87463ed7dcdaf9b0b87d3b7ca88e462083b90e0950b45709a4263f9d182bde1a02d0ec3e1d72a8555ff62982b7fed756e183a505df29be80d24f4566d

  • SSDEEP

    98304:l9wXZutWQszZ8lqCMHDkwu96IowU4YlQ3d/jtXDuRzNWEllsHwvu7kh4aqDT:MpzAqCMjkwcAQzuRzU8ruqK3

Malware Config

Extracted

Family

redline

Botnet

probnik

C2

65.108.14.118:53868

Attributes
  • auth_value

    0aa1accf6b8c22c36f0ecf0d20dd081e

Targets

    • Target

      JaffaCakes118_60b575d705bab021160455b8bdaa47d8

    • Size

      5.8MB

    • MD5

      60b575d705bab021160455b8bdaa47d8

    • SHA1

      8be6507d7d188322c48ce9dcff3f334ac01f24e3

    • SHA256

      80e00489b75a9c8682f88ec4e50aef6fd5f321b825c0542286cd473ab73baa16

    • SHA512

      db407cc87463ed7dcdaf9b0b87d3b7ca88e462083b90e0950b45709a4263f9d182bde1a02d0ec3e1d72a8555ff62982b7fed756e183a505df29be80d24f4566d

    • SSDEEP

      98304:l9wXZutWQszZ8lqCMHDkwu96IowU4YlQ3d/jtXDuRzNWEllsHwvu7kh4aqDT:MpzAqCMjkwcAQzuRzU8ruqK3

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks